ComputerWeekly.com Research Library

All Research Sponsored By:Imprivata

View this expert e-guide to examine why e-prescribing software is growing in prominence in the U.S., the 3 medical errors you can mitigate with e-prescribing, and the 4 requirements a system needs for you to receive incentive payments from the Centers for Medicare and Medicaid Services (CMS).

This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.

This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.

This brief video explores how Augusta Health leveraged a single sign-on technology to make it easier for physicians to use technology in the clinical workflow, while also improving the protection of confidential patient information.

This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.

View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs.

Learn about Memorial Healthcare’s latest approach to ensure that its clinicians have fast and secure access to critical patient information. You will learn about secure “follow me” desktops to provide doctors and nurses with patient information at their fingertips - from any workstation or personal device.

The move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both.

The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.

This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.

Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.